Internet Governance Forum Analysis on Artificial Intelligence in Cyber Security

  • Faishal Ihsan Alumni
  • Nuriyeni Kartika Bintarsari

Abstract

Abstract


This research examines the way the Internet Governance Forum (IGF) discusses Artificial Intelligence (AI) in the cyber security field. The discussion focuses on 2016, 2017 and 2018 periods. This article utilizes two concepts; cyber politics and internet governance. IGF believes that AI can be regulated collectively with solid frameworks and clear regulations. This in turn will maximize the security aspect of cyber security, which will be cheaper and more efficient in the era of internet freedom and technology rapid development. The paradox in AI lies in the breach of data privacy, which contradicts the goal of cyber security itself, i.e. to protect user’s privacy and sensitive data away from any kind of unauthorized access. Framework cooperation based on mutual recognition of the importance of security within governments, private sectors, technical community and civil society can address privacy and cyber security concerns without undermining the open, free and secure nature of the internet. Hence, a stable and reliable cyber security focused on data protection will provide and preserve trust in cyberspace, and will eventually bring socioeconomic growth, innovation and education advancement.


 


Keywords: IGF, AI, cyber security


 


Abstrak


Penelitian ini mengkaji bagaimana Internet Governance Forum (IGF) membahas Artificial Intelligence (AI) di bidang keamanan siber (cyber security). Pembahasan difokuskan pada periode 2016, 2017 dan 2018. Artikel ini menggunakan dua konsep; politik dunia maya (cyberpolitics) dan tata kelola internet (internet governance). IGF memandang bahwa AI dapat diatur secara kolektif melalui kerangka kerja yang kokoh dan regulasi yang jelas. Hal ini pada akhirnya akan memaksimalkan aspek keamanan siber yang semakin murah dan efisien di era kebebasan internet dengan perkembangan teknologi tumbuh pesat. Paradoks dalam AI terletak pada pelanggaran privasi data, yang bertentangan dengan tujuan keamanan dunia maya itu sendiri, yaitu untuk melindungi privasi pengguna dan data sensitif dari segala jenis akses yang tidak sah. Kerangka kerja sama ini didasarkan pada pengakuan timbal balik akan pentingnya keamanan di dalam pemerintah, sektor swasta, komunitas teknis, dan masyarakat sipil yang dapat mengatasi masalah privasi dan keamanan dunia maya tanpa merusak sifat internet yang terbuka, bebas, dan aman. Karenanya, keamanan siber yang stabil, andal dan berfokus pada perlindungan data akan memberikan dan memelihara kepercayaan masyarakat di dunia maya, dan pada akhirnya akan membawa pertumbuhan sosial ekonomi, inovasi, dan kemajuan pendidikan.


 


Keywords: IGF, AI, cyber security

References

Bjola, Corneliu. (2019). “Diplomacy in the Age of Artificial Intelligence.” Retreived from http://www.realinstitutoelcano.org/wps/portal/rielcano_en/contenido?WCM_GLOBAL_CONTEXT=/elcano/elcano_in/zonas_in/ari98-2019-bjola-diplomacy-in-the-ageof-artificial-intelligence.

Bulao, Jacquelyn. (2020). “How Many Cyber Attacks Happen Per Day in 2020?” Retrieved from https://techjury.net/blog/howmany-cyber-attacks-perday/#gref.

Choucri, Nazli. (2013). “Cyberpolitics in international relations.” Retrieved from http://cis.mit.edu/publications/newsletter/cyberpoliticsinternational-relations.

Christou, Luke. (2019, 25 Februari). “Satya Nadella: These are the technology trends set to “change the landscape of computing”.” Retrieved from https://www.verdict.co.uk/satyanadella-mwc-technology-trends/.

Congressional Research Service. (2019). “Artificial Intelligence and National Security.” Retrieved from https://fas.org/sgp/crs/natsec/R45178.pdf.

NHS Digital. (2017). “An Introduction to Cyber Security.” Retrieved from https://www.digitalsocialcare.co.uk/latest-guidance/an-introduction-to-cyber-security/.

Deloitte China. (2019). “Global Artificial Intelligence Industry White Paper.” Retrieved from https://www2.deloitte.com/content/dam/Deloitte/cn/Documents/technology-mediatelecommunications/deloitte-cntmt-ai-report-en-190927.pdf.

Dingwerth, Klaus & Pattberg, Philipp. (2006). “Global Governance as a Perspective on World Politics.” Retrieved from https://www.researchgate.net/publication/260121396_Global_Governance_as_a_Perspective_on_World_Politics.

Featherly, Kevin & Gregersen, Eric. (2016). “Arpanet: United States Defense Program.” Retrieved from https://www.britannica.com/topic/ARPANET/.

Horowitz, Michael C. (2018). Artificial Intelligence, International Competition, and the Balance of Power. Texas National Security Review, 1(3), 36-57.

IBM. (2019). “AI for cyber security.” Retrieved from https://www.ibm.com/security/artificial-intelligence.

IGF. (2014). “The Global Multistakeholder Forum for Dialogue on Internet Governance Issues.” Retrieved from http://intgovforum.org/multilingual.

IGF. (2016). “Best Practice Forums (BPF) Cybersecurity.” Retrieved from https://www.intgovforum.org/multilingual/content/bpf-cybersecurity-2016.

IGF. (2017). “Best Practice Forums (BPF) Cybersecurity.” Retrieved from https://www.intgovforum.org/multilingual/content/bpfcybersecurity-2017.

IGF. (2018). “Best Practice Forums (BPF).” Retrieved from https://www.intgovforum.org/multilingual/content/bpf-cybersecurity-2018.

Internet World Stats. (2020). World Internet Usage And Population Statistics 2020 Year-Q2 Estimates. Retrieved from https://www.internetworldstats.com/stats.html.

Katte, Abhijeet. (2018, 16 August). “Artificial Intelligence is a key to future international relations dynamics.” Retrieved from https://analyticsindiamag.com/artificial-intelligence-is-a-key-tofuture-international-relations-dynamics/.

Kurbalija, Jovan. (2014). “An Introduction to Internet Governance.” Retrieved from http://www.diplomacy.edu/.

Llorente, R. V. (2018). “A Digital Geneva Convention? The Role of the Private Sector in cyber security.” Retrieved from http://www.lse.ac.uk/ideas/publications/updates/cyber security.

Masters, Jonathan. (2014, 23 April). “What Is Internet Governance?” Retrieved from https://www.cfr.org/backgrounder/what-internet-governance.

Matthews, T. (2019, 8 Januari). “Operation Aurora – 2010’s Major Breach by Chinese Hackers.” Retrieved from https://www.exabeam.com/information-security/operationaurora/.

Mueller, Milton., Mathiason, John., Klein, Hans. (2007). The Internet and Global Governance: Principles and Norms for a New Regime. Global Governance Journal, 13(2), 237-254.

Nadella, Satya. (2018). Hit Refresh. Yogyakarta: Penerbit Bentang.

Smith, B. (2017). “Transcript of Keynote Address at the RSA Conference 2017 - The Need for a Digital Geneva Convention.” Microsoft Corporation, 1–15. Retrieved from https://mscorpmedia.azureedge.net/mscorpmedia/2017/03/Transcript-of-Brad-Smiths-Keynote-Address-at-the-RSA-Conference-2017.pdf.

Ozgercin, Kevin V., & Weiss, Thomas G. (2014). The Evolution of Global Governance. Retrieved from https://www.eolss.net/SampleChapters/C14/E1-35-03-04.pdf.

Pauwels, Eleonore. (2019). The New Geopolitics of Converging Risks: The UN and Prevention in the Era of AI. United Nations University Centre for Policy Research. Retrieved from https://collections.unu.edu/eserv/UNU:7308/PauwelsAIGeopolitics.pdf.

Petrov, Christo. (2020, September). 25+ Impressive Big Data Statistics for 2020. Accessed from https://techjury.net/blog/bigdata-statistics/#gref.

Rahmawati, I. (2017). Analisis Manajemen Resiko Ancaman Kejahatan Siber (Cyber Crime) dalam Peningkatan Cyber Defense. Jurnal Pertahanan & Bela Negara, 7(2), 51-66.

Rouse, M. (2020). Malware (malicious software). Retrieved from https://searchsecurity.techtarget.com/definition/malware.

Rouse, M. (2019). Phishing. Retrieved from https://searchsecurity.techtarget.com/definition/phishing.

Sample, Ian. (2018). What is the internet? 13 key questions answered. Retrieved from https://www.theguardian.com/technology/2018/oct/22/what-isthe-internet-13-key-questionsanswered/.

Soewardi, I. A. (2013, Maret). Perlunya Pembangunan Sistem Pertahanan Siber (Cyber Defense) yang tangguh bagi Indonesia. Retrieved from Media Informasi Ditjen Pothan Kemhan: https://www.kemhan.go.id/pothan/2014/04/19/perlunyapembangunan-sistempertahanan-siber-cyber-defenseyang-tangguh-bagi-indonesia.html.

Sugiyono. (2013). Memahami Penelitian Kualitatif. Bandung: Alfabeta.

Valeriano, Brandon, & Maness, Ryan. (2018). International relations theory and cyber security: Threats, conflicts, and ethics in an emergent domain. Retrieved from https://www.researchgate.net/publication/326845990_International_relations_theory_and_cyber_security_Threats_conflicts_and_ethics_in_an_emergent_domain.

Winston & Strawn. (2020). What is the Definition of Emerging Technology?. Retrieved from https://www.winston.com/en/legal-glossary/emergingtechnology.html.

Wirkuttis, Nadine & Klein, Hadas. (2017). Artificial Intelligence in cyber security. Cyber, Intelligence, and Security, 1(1), 103-119.
Published
2021-01-26
How to Cite
IHSAN, Faishal; BINTARSARI, Nuriyeni Kartika. Internet Governance Forum Analysis on Artificial Intelligence in Cyber Security. Insignia: Journal of International Relations, [S.l.], p. 32-47, jan. 2021. ISSN 2597-9868. Available at: <http://jos.unsoed.ac.id/index.php/insignia/article/view/3782>. Date accessed: 18 apr. 2024. doi: https://doi.org/10.20884/1.ins.2021.0.0.3782.

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.